Because vulnerabilities in third party and unused software increase the risk of unauthorized system access and disruption of availability, it is important to review all software installed on VMware host machines and evaluate its use.

Verify and update security settings for vRealize Automation virtual appliances and the Infrastructure as a Service component as appropriate for your system configuration. In addition, verify and update configuration of other components and applications.